Comodo Two Factor Software Version 2.8

Size: px
Start display at page:

Download "Comodo Two Factor Software Version 2.8"

Transcription

1 Comodo Two Factor Software Version 2.8 Administration Guide Guide Version Comodo Group Inc Broad Street STE 100 Clifton, NJ 07013

2 Table of Contents 1.Introduction to Comodo Two Factor Overview of Solution & Outline of Processes First Factor Authentication - Existing User Credentials Second Factor Authentication - Digital Client Certificates Auxiliary, Out of Band, Second Factor Authentication Comodo Two Factor Authentication Benefits Guide Structure Definition of Terms Administrator's and Operator's Roles Comparative Table Logging into Comodo Two Factor Admin Interface The Main Interface Summary of Areas User Admin Settings Roles Blacklist Reports License Logout The 'Users' Tab Overview 'User' Table of Parameters User Management Adding a New User User Actions Reset User Set Max No. of Certs Set Access IP Range Set Language View History Browser Usage and Settings View Options Filtering Options View Activation Code Sent to the User Remove Selected Users The 'Admin' Tab Overview Admin Management Adding New Administrators and Operators Editing an Administrator or Operator Filtering Options The 'Settings' Tab Overview Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 2

3 4.2 Change Password Clear History Records The 'Roles' Tab Overview Roles Management Adding a New Role Editing the Permissions Granted to a Role Filtering Options The 'Blacklist' Tab The 'Reports' tab Overview View Report The 'License' Tab License Update Logging out of Comodo Two Factor FAQ About Comodo Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 3

4 1.Introduction to Comodo Two Factor Comodo Two Factor (ComodoTF) service is a two factor authentication solution for secure access to confidential services. An authentication factor is a piece of information and process used to authenticate or verify a person's identity or other entity requesting access under security constraints. Two-factor authentication is a system wherein two different factors are used in conjunction to authenticate. 1.1 Overview of Solution & Outline of Processes Digital Client Certificates are an easy to deploy, affordable and effective PKI solution to enabling the enhanced user identification and access controls needed to protect sensitive online information. Client certificates are delivered electronically, and can be automatically installed on just about any computer or mobile device. They can also be stored and transported on smart cards or USB tokens for use when traveling. PKI client certificates are an essential element of Comodo s Two-Factor Authentication solution that provides strong user access authentication, protects the privacy of online data, and offers a transparent log-on method that won't inconvenience users. Each certificate, in addition to traditional login credentials, establishes a user s unique identity to a remote server application in this case the Comodo Two Factor proxy server. Each certificate can only be used to authenticate one particular user because only that user s computer has the corresponding and unique private key needed to complete the authentication process. Selfenrollment for and installation of a client certificate onto an end users' machine requires no expertise and will not inconvenience users like other two factor solutions that rely upon expensive physical devices. A PKI based client certificate assures an enterprise that the person logging into a secure service is indeed one of their users by validating not only their User ID and Password, but their certificate as well. This type of solution can only be delivered by a Certification Authority such as Comodo because only a Certification Authority has the experience, expertise and security infrastructure to manage the full life-cycle of public digital certificates - including issuance, renewal and revocation. The remainder of this section includes a brief overview of the authentication methodologies that are implemented by the Comodo TF solution in order to provision true, Two Factor Authentication of end users, namely: First Factor Authentication - Existing User Credentials Second Factor Authentication - Digital Client Certificates Auxiliary, Out of Band, Second Factor Authentication First Factor Authentication - Existing User Credentials The first factor includes: The login page hosted on the Two Factor Server is an exact copy of the enterprise s existing login page (This makes the Two Factor Server transparent to the end user). Once the account holder enters their username and password, the Two Factor Server hands the request off via a secure SSL connection to the enterprise s server. The enterprise server then processes the login request and responds to the Two Factor proxy server. Note: The Two Factor server does not keep a record of any user details such as passwords or account information - nor does it require such information in order to deploy the Two Factor Client Certificates to the end user. The Comodo Two Factor Server will only proceed to the provisioning and/or authentication of the client certificate after the enterprise s web server has validated the account holders username and password Second Factor Authentication - Digital Client Certificates The provisioning of an X.509 client certificate onto the end users machine. This certificate, once installed into the certificate store of the user s Internet browser (e.g. Internet Explorer, FireFox, Opera) will be requested and verified every time the user logs into the Two Factor server and will authenticate them as the genuine account holder. The presence of this certificate on the end users machine is needed to complete the authentication process. This means that even if a hacker obtained an account holders username and password, they would still be denied access to the account because the Two Factor server would not detect the client certificate on the machine the hacker is connecting from. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 4

5 1.1.3 Auxiliary, Out of Band, Second Factor Authentication In order to validate themselves to the Two Factor servers, a user must connect from a machine that they have installed a certificate on. If this is not the case, and no certificate is detected, then the primary Two-Factor process cannot be completed. Example scenarios include: 1. The user chose not to install an authentication certificate during the New User Enrollment Process. In this instance, the user will have to go through the activation procedure every time they log on or until such time as they decide to install a certificate. 2. The user is attempting to access his account from a different machine to the one they installed the certificate on. For example, they are using their work computer or laptop for the first time to access their account but installed the certificate on their home PC; they are trying to access from a public computer such as those in Internet cafes or libraries; they are trying to access from a mobile device for the first time; they are trying to access from a recently purchased computer. To ensure the highest levels of validation are used at all times, Comodo Two Factor also incorporates an out-of-band second factor authentication process via telephone or SMS. During enrollment the user is required to supply a minimum of one and a maximum of four contact telephone numbers. They are also required to enter a contact address. In the event that a certificate is not detected on the user s machine during a subsequent connection attempt, then user will be presented with a pre-populated list of these contact details and asked to choose one. The Two Factor server will then send a randomly generated, one-time activation password to the chosen location. (If they selected a telephone number, they will receive an automated voice message. They also have the option to receive the password as an SMS text message or ). The Administrator can view the one time activation password generated for the user and how the password was sent to the user from the Admin Console. For more details see the section View Activation Code Sent to the User. The user must then enter this activation password at the website. If it is verified as correct by the Two Factor server, then the user is allowed to connect to their account. They are also provided with the opportunity to install a client certificate on the machine they are currently attempting to connect from. For computers and devices that the user wishes to be trusted (computers they own or use at work) then a certificate should be installed. For computers that the user does not wish to be trusted (computers in public places such as Internet cafes or computers they do not plan to use regularly), then the user should use the activation password mechanism. The diagram below shows a basic outline of the authentication process that an *existing* Comodo Two Factor end user will experience when they: Log onto to the secure service from a computer which already has a client certificate installed. Log onto the secure service from an unknown or new computer which does not yet have a client certificate installed. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 5

6 1.2 Comodo Two Factor Authentication Benefits 1. Highly flexible and configurable proxy-based authentication solution that can be virtually deployed in hours. 2. Seamless front-end for most user-access web pages, as well as for Microsoft Outlook Web Access and SharePoint. 3. Leverages Comodo s Public Key Certificate Authority Infrastructure. PKI is widely recognized as supplying the strongest form of authentication and encryption service available. 4. Low cost automates the digital certificate issuance and management keeping administrative overhead to a minimum. No modification to existing applications. 5. Easy to Use simple client account setup conveniently allows continued use of existing user-names and passwords. Certificates are automatically installed. 1.3 Guide Structure This guide is intended to take you through the step-by-step process of organization, configuration and use of Comodo Two Factor service. Section 1, Introduction to Comodo Two Factor is a high level overview of the solution and serves as an introduction to the main themes and concepts that are discussed in more detail later in the guide. Section 2, The 'User' tab covers the creation and management of End Users. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 6

7 Section 3, The 'Admin' tab covers the creation and management of Administrators and Operators. Section 4, The 'Settings' tab contains information on how to change ComodoTF access password and clear History Records. Section 5, The 'Roles' Tab contains explanations on creating and editing new roles that can be assigned to Administrators and Operators. Section 6, The 'Blacklist' tab contains information on how to deny access requests that come from IP addresses from specific countries. Section 7, The 'Reports' tab contains an overview of the area, descriptions of each report type and guidance on how to access the required report type. Section 8, The 'License' tab explains the process for viewing and changing of the license. Section 9, Logging out of Comodo Two Factor explains the process for logging out. Section 10, FAQ contains FAQ that cover certain aspects of the service. Section 11, About Comodo contains company and contact information Definition of Terms Access, management and executional privileges in Comodo Two Factor are spread across three default classes of user Administrator, Operator and User. Administrators and Operators are types of 'Role' - each with a distinct set of pre-configured permissions and capabilities (see Roles for more details). The default privileges available to each of these role types is outlined in the following table and the table in section Definition of Terms Role Type Definition Administrator Administrators are the top level administrator and can access all areas and functionality of the ComodoTF administrative console. Administrators have full visibility and control over Client Certificates of users Administrators are listed in and can be managed and created from the 'Admin' area of the ComodoTF administrative console. Furthermore, only Administrators are allowed access to the 'Admin' area New Administrators can only be created and managed by an existing Administrator Administrators are able to create and manage 'Administrators', 'Operators' and can manage all Users Administrators can change the product license Operator Operators have privileges to access administrative console, monitor and manage users activity. Operators have full visibility and control over Client Certificates of users Operators have no access to 'Admin' area of the interface Operators cannot create other Operators or Administrators Operators cannot change product license Operators cannot clear History Records User A User is a person that has authenticated themselves to the Two Factor interface by logging into their secure web service account and, in doing so, have requested or been provisioned with an authentication certificate or secure cookie. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 7

8 Definition of Terms 'Users' have no access rights whatsoever to the administrative console of Comodo TF. They exist in Comodo TF as a function of their request/ownership of a second factor authentication credential such as security cookie or digital certificate A new End-User can be created in Comodo Two Factor: a) via Manual creation by an Administrator or an Operator in the 'User' tab b) Automatically via Self-enrollment procedure (when logging to the secure website / service account e.g. his/her bank account for the first time) All Users are listed in the 'User' tab of ComodoTF interface Administrator's and Operator's Roles Comparative Table Note: The table below lists the default permissions for the Role types of 'Administrator' and 'Operator'. These are the default Roles that ship with Comodo Two Factor and their configuration of permissions cannot be modified. If an administrator with a different permutation of permissions is required then you must create a new Role type (click the Add Role button in the Roles area). Once created, the new Role type can be assigned to users as required. Roles - Comparison of Default Permissions Actions Definition Role = Administrator Role = Operator Manage Administrators View, Add, Edit, Change Password Manage Operators View, Add, Edit, Change Password Manage Users Multiple view and Action settings. See The Roles tab for full list. View Reports All type of reports available View License View Update License Update View Roles Add, Edit Delete Applications View, Edit Manage Users' Certs Add, Delete, Edit Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 8

9 Roles - Comparison of Default Permissions Change Settings Change Password Clear History Records Restricted Countries View, Change 1.4 Logging into Comodo Two Factor Admin Interface To access Comodo Two Factor (ComodoTF) For Windows users click: Start > All Programs > Comodo > ComodoTF > ComodoTF start. For Unix users: go cd ComodoTF-xx/bin execute $./startup.sh This will launch ComodoTF application: Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 9

10 Alternatively, once your account has been setup, your account manager will provide the login URL for the Comodo Two Factor interface. By default, the format of this URL is: Enter your login and password, and click the Login button. If you have not been supplied with your login details, please contact your account manager. After logging in, the password for your administrators account can be changed at any time via the 'Settings' tab. 1.5 The Main Interface Summary of Areas Comodo Two Factor interface has a tab structure that facilitates access to all major settings. There are (a maximum of) nine tabs that cover each of the main functional areas of the solution. These are 'Admin', 'User', 'Settings', 'Roles', 'Blacklist', 'Reports', 'License' and 'Logout'. The remainder of this introductory section contains a brief introduction to each tabbed area. Full details of the actual usage and functionality of the tabbed areas listed above are in sections 'The User tab', 'The Admin tab', Settings, Roles, Blacklist, License and Reports. Tip: Pointing the mouse cursor over the main console elements will show helpful tool tips which contain a short explanation of the element's functionality User List of ComodoTF service end-users. Allows appropriately privileged personnel to add new users and edit existing users. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 10

11 Click here for more information about the 'User' section Admin Displays a list of personnel with administrative roles, including 'Administrators', 'Operators' and custom roles that have been created using the 'Roles' area. This area also facilitates the addition, editing and removal of administrators/operators/personnel with custom roles. Click here for more information about 'Admin' section Settings Allows the person that is currently logged in to modify their password and clear history records. Click here for more information about the 'Settings' area. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 11

12 1.5.4 Roles Allows the administrator to create new roles and edit permissions for the created roles. Click here for more information about the 'Roles' area Blacklist Provides full management of ComodoTF service administrators. Click here for more information about the 'Blacklist' area Reports Enables the administrator to create various activity and user related reports. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 12

13 Click here for more information about 'Reports' section License Displays the current license information and enables the Administrator to renew the license upon expiry. Click here for more information about 'License' section Logout Logs the current user out of the ComodoTF service. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 13

14 2 The 'Users' Tab 2.1 Overview Once you login, you will see the list of users (if any), that were already authenticated via Comodo Two Factor 'User' Table of Parameters User Table of Parameters Field Name Value Description User name User name User name as entered in login box. Last Login Date, or blank Date of the last login, or blank if user never logged in. Auth Type New User Question Challenge Callback Cert Installed User is new, and no security questions/answers, nor certificate installations were done for this user. User authenticates with security question. User authenticates with callback. The user entered questions/answers challenge and installed a client certificate at least once. This shows that the user tried to install certificate someday, but user still can reject certificate during installation process, delete it or login from the other browser without certificate via security questions or callback. No Auth Cookie User doesn't need to provide certificate, or to answer security question. He will be logged into the system right after entering correct login/password. User can install secure cookie and authenticate with it. State OK User can access the site. LOCKED User locked and will not be able to access the site. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 14

15 User Table of Parameters LOCKED DUE TO WRONG ANSWER User is locked because the wrong answer was entered. RESET User's questions were reset, and reset code was generated, but wasn't entered. Revocation Time Date, or blank Date and time when the certificate was revoked. All certificates issued prior to that date will not work. Action Control Enables administrator manage that user settings. Add User Control Enables administrator to add a new user. Refresh Control Updates the list of displayed users to reflect changes such as newly added user; changes in state or authentication type, etc. 2.2 User Management The 'User' area provides administrators with the ability to create new users, grant or deny access to ComodoTF end-user interface Adding a New User 1. Switch to the 'User ' tab; 2. Click the Add button to open the Add User form. 3. Enter a new user name. 4. Click 'Save' to add the end-user to the ComodoTF User Actions Point the mouse cursor over the 'User Actions' control alongside the end-user's name to view 'actions' menu: Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 15

16 Note: The options in the Actions dialog depend on the permissions defined in the Role, assigned to the Administrator/Operator currently logged-in. For a full list of default permissions granted to Administrators and Operators, see Administrator's and Operator's Roles Comparative Table and for more details on Roles and creating a new role, see The Roles tab. Action Dialog Table of Parameters Action Description Lock User Enables administrator to lock the user account, preventing user from logging in. Unlock User Enables administrator to unlock a previously locked user account, enabling user to log - in. Set to No Auth Enables administrator to set the user state to No Auth (available only if state is not No Auth). A user can log in entering only login/password and don't use certificate or cookies, do not answer on security questions and not to enter an activation code if he need it before. User's Auth Type becomes 'No Auth'. To enable this action in rules.xml should be entered: challenge type="no_auth" Note: Setting a User to No Authorization state completely resets the user. The user will be treated as new user and all the credentials like security questions and answers are to be reset on re-authorizing the user. Set to 'Auth' Enables administrator to set normal authentication for the user. User state will be set as New User. (available only if state is No Auth) Reset User Sets user state to 'New User' clearing out existing security questions, answers or phone numbers, cookies and addresses. (in case if FULL_RESET is enabled in user's configuration). Otherwise, admin needs to select options for user to change during next login into the secure website. Set Max. No of Certs Sets certificates' quantity available for the user. Possible values: default, unlimited, custom. Click here for more information. Set Access IP Range Enables the administrator to manage IP ranges for user. Click here for more information. Language Enables the administrator to set the interface language for the user. Click here for more information View History Enables administrator to view the list of events that occurred to the user. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 16

17 Action Dialog Table of Parameters Browser Usage and settings Enables administrator to view the list of browsers (locations) through which the user has loggedin to the secure website. If required, the administrator can also change the authentication modes (Client Certificate/Security Cookie/Callback(or questions)) for every registered browser used by the user. Click here for more information. Revoke Certificates Enables administrator to revoke all certificates issued before current time. (available only if a digital certificate is installed). To enable possibility to install certs for users rules.xml should contain: challenge type="client_cert" (should be above 'COOKIE' challenge type) Delete User Enables the administrator to delete the selected user and revoke that user's client certificate or security cookie. Although all user data will remain in the database, Comodo Two Factor will treat this user as though they were a NEW user upon subsequent attempts to log in to the secure service (banking website etc). Upon deletion: Any authentication cookies associated with this user will be invalidated. Any client certificates issued to the user will be revoked The next time this user attempts to login they will need to go through the initial set up process again and enter their address, set up their call back data / security questions and be offered the opportunity to obtain a new client certificate or security cookie. For all options listed above (except Reset User, 'Max Set Max. No of Certs', 'Set Access IP Range', 'View History', View History, Browsing usage and settings, delete User and 'Locations') the following dialog appears: This enables administrator to comment the action. The descriptions of the exceptions' dialogs follow below Reset User The 'Reset User' option enables administrators to manually reset all or some of the user's security settings. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 17

18 Reset User Table of Parameters Reset Type Description Resets user's . User will have to set at next login once more. Questions Resets user's security questions / answers. User will have to set them at next login once more. Clear cookie Resets user's security cookie. User will have to get it at next login once more. Code prompt (autogenerate) Sends one-time password (reset code / activation code) to user. Callback Resets user's callback settings. User will have to set them at next login once more. Select Visible only if 'Code prompt' is checked. Enables administrator to send automatically generated one-time access password to the user's address Set Max No. of Certs 'Set Max. no of certs' enables the administrator to assign the number of certificates that can be allotted to the user. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 18

19 Select any one of the following options by selecting the corresponding radio button: Default, Unlimited or Custom and enter the number that denotes the number of certificates for the selected option Set Access IP Range 'Set Access IP range' enables the administrator to manage IP ranges for user. Depending on the configuration of Comodo Two Factor service administrator can set the followings types of authentication: By default, if users come from known IP addresses (specified in the IP range) access is granted without any security checks. If users come from unknown IP addresses (not specified in the IP range) users must identify themselves via their designated authentication procedure (Security Questions or Call Back); If users come from known IP addresses (specified in the IP range) access is granted without any security checks. If users come from unknown IP addresses (not specified in the IP range) access denied and no security checks take place. If users come from known IP addresses (specified in the IP range) they must identify themselves via their designated authentication procedure (Security Questions or Call Back). If users come from unknown IP addresses (not specified in the IP range) access is denied and no security checks take place. Note: This will work if enabled in rules.xml (see 'Installation&Configuration Guide: Comodo Two Factor Integration Challenges' section). IP Range Table of Parameters Form Element Type Description IP range Text Field Administrator should specify IP range for the user. It should be IP address followed by netmask, e.g /16. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 19

20 IP Range Table of Parameters Add Control Enables administrator to add desirable IP range to the list of IP ranges. IP Text Field Shows the defined IP range. Enabled Check-box If checked the rule of defined range for that user is active. Delete Control Deletes the IP range from the list. Save Control Saves the changes Set Language The 'Set Language' option enables the administrator to set the interface language for the user corresponding to the locality of the user. Select Locale Table of Parameters Form Element Type Description Please select the language Drop-down menu Administrator should select the interface language for the user from the dropdown menu. Please enter the reason for changing the language Text Field Administrator should enter a reason for setting or changing the interface language. Save Control Saves the changes. Cancel Control The 'Cancel' button annuls the changes. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 20

21 View History Selecting the 'View History' action will open a log of all events relating to the chosen user during their interaction with the Comodo Two Factor service. History Dialog Table of Parameters Form Element Type Description Title Text Field Title shows the user's name. Date Text Field Date/Time of the last action; Action Text Field Operation, that was performed. Comment Text Field The comment entered in the Please enter reason dialog while performing the respective user action. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 21

22 History Dialog Table of Parameters Admin Text Field Username of the administrator, that performed the action. Filled out only for actions, which Administrator performed for the given user. IP Text Field User's IP address. Filled out only for actions, which were performed by the given user. Cert Date Text Field Date/Time of the certificate's generation (the certificate, that was used during last login to the secure account). This information is additional monitoring factor and is saved in database of ComodoTF server. Close Control Closes the 'History' dialog. The following table lists the various Actions Values in the History dialog and their description: Table of Actions Value of History Dialog Action Value Description CREATE The Administrator's account was created ANSWER_FAILED Entered invalid answer to security question LOGIN User logged into the account via ComodoTF LOGIN_FIRST User logged into the account via ComodoTF for the first time LOGIN_FAILED User entered invalid login or password LOGOUT User logged out. ADMIN_LOGIN_FAILED Administrator entered invalid login or password LOCK User was locked by administrator LOCK_COMPLETE User was locked due too many failed unlock attempts INCORRECT_UNLOCK_CODE User entered wrong unlock code INCORRECT_ONETIME_PASSWORD User entered wrong one-time password LOCK_MAX_FAILED_ATTEMPTS User was locked due too many failed attempts LOCK_ADMIN_MAX_FAILED_ATTEM Administrator was locked due too many failed attempts Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 22

23 Table of Actions Value of History Dialog PTS LOCK_RESET_CODE User was locked due too many failed reset attempts USER_UNLOCK_BY_ADMIN User was unlocked by administrator USER_SELF_UNLOCK User unlocked himself (using reset code (One-Time Password)) USER_UNLOCK_BY_TIMEOUT User was unlocked after timeout USER_RESET_BY_ADMIN User settings were reset by administrator USER_UPDATED_PHONES User updated phones by Admin prompt USER_BROWSER_SETTINGS_UPDA TED Browser settings updated by administrator FULL_RESET After full reset user status is changed to New User USER_RESET_BY_ADMIN_WITH_CO DE User settings were reset with code prompt by administrator RESET_CODE_SMS_SENT Reset Code has been sent via SMS RESET_CODE_SMS_SENDING_FAILE D Sending Reset Code via SMS failed RESET_CODE_CALLBACK_SENT Reset Code has been sent via callback RESET_CODE_CALLBACK_SENDING _FAILED Sending Reset Code via callback failed RESET_CODE_ _SENT Reset Code has been sent to RESET_CODE_ _SENDING_FAI LED Sending Reset Code via failed RESET_CODE_GENERATED Reset Code (One-Time Password) was generated RESET_CODE_ENTERED_INVALID User entered Invalid Reset Code RESET_CODE_ENTERED_CORRECT User entered valid Reset Code RESET_CODE_POSSIBLE_HACK User tried to bypass Reset Code, possible Hack attempt. If user was reset by Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 23

24 Table of Actions Value of History Dialog admin he can try to load reset code page from his old store and submit it. In this case system does not allow him to check old reset code and locks this attempt. USER_ENROLLED_CERT User authenticated with previously installed certificate USER_ENROLLED_AFTER_INSTALL_ CERT User authenticated after installing the certificate USER_ENROLLED_AFTER_INSTALL_ CERT_ERROR User logged into the account after a certificate installation error USER_ENROLLED_AFTER_CERT_IN STALL_CANCEL User logged into the account after canceling certificate installation USER_ENROLLED_AFTER_CRT_AG R_DECLINED User logged into the account after declining certificate agreement USER_ENROLLED_WITH_NO_AUTH User logged into the account without TF authentication USER_ENROLLED_WITH_KNOWN_IP User logged into the account from a known IP address USER_ENROLLED_WITHOUT_QUEST ION_SET User logged into the account without defining security questions (using 'Continue' button) USER_ENROLLED_QUESTION User authenticated with security questions USER_ENROLLED_WITHOUT_CALLB ACK_SET User logged into the account without defining callback settings (using 'Continue' button) USER_ENROLLED_CALLBACK User authenticated with callback info USER_ENROLLED_AFTER_INSTALL_ COOKIE User logged into the account after installing the security cookie USER_ENROLLED_COOKIE User authenticated with previously installed cookie PROXY_DENIED_BLACKLISTED User access is denied: the location is in Black list PROXY_DENIED_UNKNOWN_IP User access is denied: user IP is unknown CERT_INSTALL_SKIPPED User had problem installing certificate on IE and skipped the installation. He authenticated using proxy. ERROR_INSTALL_CERT Certificate installation was failed Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 24

25 Table of Actions Value of History Dialog INSTALL_CERT_SPKAC Certificate for Gecko engine browser was generated ERROR_INSTALL_CERT_SPKAC Certificate for Gecko engine browser generation was failed INSTALL_CERT_CRMF Certificate for Gecko engine browser was generated ERROR_INSTALL_CERT_CRMF Certificate for Gecko engine browser generation was failed INSTALL_CERT_PKCS10 Certificate for MS Internet Explorer was generated ERROR_INSTALL_CERT_PKCS10 Certificate for MS Internet Explorer generation was failed INSTALL_CERT_PKCS12 Certificate for other browsers was generated ERROR_INSTALL_CERT_PKCS12 Certificate for other browsers generation was failed CERT_AGREEMENT_ACCEPTED User accepted install certificate agreement CERT_AGREEMENT_DECLINED User declined install certificate agreement CLEAR_COOKIES Cookies were cleared by admin NO_AUTH Admin set authorization type as 'no auth' ENABLE_AUTH Admin set authorization type as 'auth' ADMIN_UPDATE Administrators account was updated (admin password was changed) LOCALE_CHANGED The interface language was changed for the user by the administrator. REVOKE All certificates installed before revoke date are disabled SET_MAX_CERTS Max amount of certificates was changed to this user UPDATE_RESTRICTED_COUNTRIES Restricted countries list was updated by administrator USER_IP_RANGES_UPDATED IP ranges were updated USER_UPDATED_ User updated by Admin prompt ENABLE_MASTER_STATUS User account was set as Master Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 25

26 Table of Actions Value of History Dialog DISABLE_MASTER_STATUS Master status was removed from user account DISABLE_COOKIE_MODE Cookie mode was disabled ENABLE_COOKIE_MODE Cookie mode was enabled ENABLE_COOKIE_MODE_BY_USER User installed authentication cookie ANSWER_POSSIBLE_HACK User tried to submit different answers by-passing our forms, possible Hack attempt. This can be caused when he entered incorrect answers 3 times (or more then configured). In case if he saved (or loaded from cache) "enter answer" page and submitted it from browser more than 3 times, his answers then were not checked, system does not allow him to login to his account and locks this attempt. URL_PARAMS_POSSIBLE_HACK User tried to submit different answers by-passing our forms, possible Hack attempt. User tries to manually enter hack parameters into URL. If user was locked by admin, he can try to enter url parameters to reach reset page. System prevents it and locks his attempt. USER_UPDATED_QA User updated security Questions and Answers by Admin prompt CHANGE_QUESTION_ANSWER User changed security question CHANGE_SECURITY_SETTINGS User changed security settings CREATE_QUESTION_ANSWER User created security questions/answers for the first time CALLBACK_DATA_CREATED User set callback data. CALLBACK_DATA_UPDATED Callback data of the user were updated by user CALLBACK_DATA_RESET Callback data of the user were reset by user USER_ADDED User was added by an administrator or operator. USER_DELETED User was deleted by an administrator or operator. MULTIPLE_USERS_DELETED Multiple users were deleted by administrator Browser Usage and Settings The 'Browser Usage and Settings' dialog displays the list of browsers (locations) through which the user has logged-in to the secure account in the previous login attempts with their authentication types. It also allows the you to change the authentication type (Client certificate/security/callback or (or Security Questions) set for each type of the browser for the specific user based Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 26

27 on compatibility of the Browser for Certificate and Cookies installation. Click here for details on compatibility of browsers with certificate and cookies installation. For example, if the certificate installation has failed for a specific browser in any of the previous attempts - meaning the browser did not support certificate installation, you can change the authentication type to cookie mode or callback mode for that browser to enable trouble free login for the user using the browser he/she wants. Browser usage... Table of Parameters Form Element Type Description Title Text Field Title shows the user's name. Auth type Text Field The current authentication type set for the browser indicated in the next column. This can be changed for future logins for the same user by clicking on the text. Click here for more details. User Agent Text Field The type of the browser, its version and the Operating System on which the browser is installed. This enables the administrator to identify the browser precisely. Failed Attempts Text Field Indicates the previous attempts in which the certificate installation has failed. This information assists the administrator to make a decision of switching this browser to cookie mode or callback mode for the selected user. IP Text Field The IP address from which the user has logged-in through this browser. Last Access Text Field The date and time of last access through this browser. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 27

28 Browser usage... Table of Parameters Save Control Saves all changes made on the user "Browser Usage and Settings" records. Close Control Closes the 'Location' dialog. Delete Control Delete concrete "Browser Usage and Settings" record. Delete all Control Delete all "Browser Usage and Settings" records. Reset Control Reset failed attempts for concrete "Browser Usage and Settings" record. Reset All Failed Attempts Control Reset failed attempts for all "Browser Usage and Settings" records. Changing the Authentication Type for Selected Browser 1. Click on the authentication type beside the selected browser. 2. From the drop-down menu, select the authentication type you want to set for the browser. 3. Click 'Save'. The change in the authentication mode settings will be saved and the 'Location' dialog will be closed. On the next login attempt by the user through the same browser, the user will be prompted to install a certificate (if you have set the authentication made as Cert installed mode), delivered a Security Cookie (if you have set the authentication made as Cookie mode) or asked to answer one of the security questions set beforehand (if you have set the authentication made as Callback mode). Compatibility of Browsers for Client Certificate Installation and Cookie Installation Browser Client Certificates Secure Cookies Internet Explorer 8 Internet Explorer 9 Internet Explorer 7 Firefox Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 28

29 Browser Client Certificates Secure Cookies Opera 9.63 and below, Opera and above Opera 9.64 and above Certificate installation unsupported Certificate enrollment on certificates installed before update to 9.63 is supported. Safari on OS without RFC5746 support Safari on OS with RFC5746 support Blackberry Chrome 3.0 and above on Windows, Mac OS and Linux Chrome 2.0 and below MS IE Mobile 6 and above MS IE Mobile 5 Not tested Konqueror 4.x Konqueror 3.x Netscape Other browsers based on IE, Safari or Firefox (AOL, OmniWeb etc.) Android View Options You can set the view type of the list of users under the Users tab by selecting the view type from the drop-down combo box near the upper left corner of the interface. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 29

30 The options available are: Show all users Selecting this will display all the users who were already authenticated via Comodo Two Factor. Show only active users Selecting this option will display only the users whose credentials are active (current users). Show only deleted users Selecting this option will display a list of only the users deleted by the administrator Filtering Options You can search for particular user name by entering part of the user name into Filter field View Activation Code Sent to the User In the event a user is connecting to the website from a machine different from that in which the security cookie or the certificate is installed, the Two Factor server will send a randomly generated, one-time activation password to the user through the user's telephone, or as SMS as chosen by the user. The user must then enter this activation password at the website. See the section Auxiliary, Out of Band, Second Factor Authentication for more details. Administrators will be able to view the one-time activation password generated for the user during the user's last login attempt from an 'out of band' machine and the mode of sending the OTP to the user (phone, SMS or ). A star icon is displayed beside 'Last Login' detail of the users, whose last login was from an 'out of the band' machine. Placing the mouse cursor over the star icon will display the last OTP generated and sent to the user and the medium (phone, SMS or ) through which the OTP was sent Remove Selected Users 1. Switch to the 'User' tab; 2. Using Filter functionality load required set of users; Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 30

31 3. Mark users for removal by clicking appropriate checkbox in the leftmost column; 4. Click the "Remove Selected Users" button to remove users; 5. Confirm removal. 3 The 'Admin' Tab 3.1 Overview The Admin tab is a useful tool for administrators, which helps them define, manage, create administrators and operators. Note: Admin tab is visible only for administrators. (More...) The Admin tab Table of Parameters Filed Name Description Login Administrator's or operator's name as entered in login box. Name Administrator's or operator's full name as entered when creating. A person's address which was set when adding. Role A person can have ADMIN's or OPERATOR's privileges. Notify If enabled a person will receive notifications about all important events. Action Actions available for a person's account (Edit or Change Password) Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 31

32 The Admin tab Table of Parameters Add Admin Enables administrator to add a new administrator or operator. Refresh Updates the list of displayed administrators to reflect changes such as newly added administrator or operator; changed person's role, etc. 3.2 Admin Management Using 'Admin' tab an administrator can create new administrator or operator, change their passwords and edit details Adding New Administrators and Operators 1. Switch to the 'Admin' tab of ComodoTF console. 2. Click on 'Add Admin' button. 3. Complete the 'Add Admin' form. 4. Click 'Save' to add the administrator or operator to the ComodoTF interface. Note: An administrator's (or operator's) details can be modified at any time by clicking the Edit button next to their name in the 'Action' section. Add Admin form Table of Parameters Form Element Type Description Username Text Field Administrator should enter login for the new administrator. Password (required) Text Field Password to access the Certificate Manager interface. Note: If 'strong' passwords are enabled then the following criteria apply: Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 32

33 Add Admin form Table of Parameters The password must be of 8-15 characters length Must be alphanumeric Must include at least one special character or uppercase letter. Strong passwords can be enabled by setting the 'ADMIN_PASSWORD_STRONG' parameter to 'true' by modifying the 'conf/localhost.properties' file. See the TF installation and Configuration guide for more details. Confirm (required) Text Field Confirmation of the above. Text Field Administrator should enter full address. Full Name Text Field Administrator should enter full name of administrator or operator. Role Drop-down Enables to assign the role with a set of administrative privileges for the new Administrator. The default roles are 'Administrator' and 'Operator' (See the table Roles Comparison of default permissions for more details). The Administrator can also create new roles with custom list of privileges and assign the role to the new Administrator. See The Roles tab for more details on creating new roles. Note: Only one role may be assigned to TF administrator. If an Administrator needs to be given a set of permissions, which is a combination of permissions pertaining to different roles, then a new role has to be created with the required permissions and assigned to the new administrator. Notify Check-box Checking this box instructs Comodo Two Factor to notify about all important events. Disabled Check-box Checking this box disables the new Administrator. Disabled administrators are highlighted with gray background Editing an Administrator or Operator To edit settings for Administrator, switch to 'Admin' tab, and point mouse cursor over the 'Admin Actions' alongside the person's name. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 33

34 Control Description Edit Admin Enables administrator to edit all person's details except username. The interface is similar to 'New Admin' interface. See the previous section Adding New Administrators and Operators for more details. Change Password Enables administrator to change Administrator's/Operator's access password Filtering Options You can search for particular Administrator by entering part of the administrator's login name into Filter field. 4 The 'Settings' Tab 4.1 Overview The 'Settings' tab enables administrator to view their current settings, such as user name, and role. It also enables the administrator to change the login password and to configure for clearing the history records for smoother operation. 4.2 Change Password Administrators can change their passwords by switching to 'Settings' tab, and clicking 'Change Password' button. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 34

35 4.3 Clear History Records The log of all events relating to each user during their interaction with the Comodo Two Factor service is maintained as history records in a history table. The number of records currently in the history table is displayed in the 'History records settings' area of the 'Settings' interface. Eventually, the number of records increase to an extent that it may impact on the performance while reading the the history table or while upgrading Comodo TF to a newer version. The administrators can clear the old and unwanted history records periodically to ensure smooth operation and easy upgrading to a newer version. To clear the history records 1. Switch to the 'Settings' tab of ComodoTF console. 2. Click 'Clear history records' button from the 'Settings' interface. A calendar window will be opened. 3. Select the date to clear all the history records logged before it. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 35

36 The selected date will appear at the bottom left of the calendar window. If you want to reselect the date (in case you have chosen the date wrongly), click the 'Clean' link and select the date again. 4. Click the 'Clear records' button. All the history records stored prior to the selected date will be removed from the history table and a conformation dialog will be displayed. 5 The 'Roles' Tab 5.1 Overview The Roles tab allows the administrator to create a new role and edit permissions for the created roles. Comodo Two Factor Administration Guide 2013 Comodo Group Inc. All rights reserved 36

Comodo Authentication Solutions Overview

Comodo Authentication Solutions Overview Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates Mutual Authentication Foreword Conducting business online offers

More information

Technical Guide for Remote access

Technical Guide for Remote access Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...

Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry... Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution

More information

Virtual Code Authentication User Guide for Administrators

Virtual Code Authentication User Guide for Administrators Virtual Code Authentication User Guide for Administrators Virtual Code Authentication - User Guide for Administrators Document No.: 05-001 2001-2015 All rights reserved. Under copyright laws, this document

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Steps for using MagicConnect

Steps for using MagicConnect Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

New Online Banking Guide for FIRST time Login

New Online Banking Guide for FIRST time Login New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Smartphone Applications NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone

More information

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

Comodo Certificate Manager Software Version 4.6

Comodo Certificate Manager Software Version 4.6 Cert dialog Comodo Certificate Manager Software Version 4.6 MRAO Administrator Guide Guide Version 4.6.063014 Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater

More information

Frequently Asked Questions Ag Banking Online

Frequently Asked Questions Ag Banking Online Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.

More information

Booth Gmail Configuration

Booth Gmail Configuration Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile

More information

Comodo Mobile Device Manager Software Version 1.0

Comodo Mobile Device Manager Software Version 1.0 Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a Net 2 NetApp Electronic Library User Guide for Net 2 Client Version 6.0a Table of Contents 1 INTRODUCTION AND KEY FEATURES... 3 SOME OF THE KEY FEATURES INCLUDE:... 3 INSTALLATION PREREQUISITES:... 3 2

More information

Evoko Room Manager. System Administrator s Guide and Manual

Evoko Room Manager. System Administrator s Guide and Manual Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0 Charter Business Phone Online Control Panel Getting Started Guide Document Version 1.0 Table of Contents 1 About This Guide...4 2 Overview...5 2.1 Online Control Panel and Call Manager... 5 3 Manual and

More information

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View: Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Comodo Mobile Device Manager Software Version 3.0

Comodo Mobile Device Manager Software Version 3.0 Comodo Mobile Device Manager Software Version 3.0 CMDM Cloud Portal Setup Guide Guide Version 3.0.010515 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Mobile Device Manager - Cloud

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

efiletexas.gov Review Queue User Guide

efiletexas.gov Review Queue User Guide efiletexas.gov Review Queue User Guide EFS-TF-200-3194 v.4 February 2014 Copyright and Confidentiality Copyright 2014 Tyler Technologies, Inc. All rights reserved. All documentation, source programs, object

More information

BlackShield ID Best Practice

BlackShield ID Best Practice BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication

More information

Office of Information Technology Connecting to Microsoft Exchange User Guide

Office of Information Technology Connecting to Microsoft Exchange User Guide OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements

More information

TriCore Secure Web Email Gateway User Guide 1

TriCore Secure Web Email Gateway User Guide 1 TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email

More information

efiletexas.gov Court Administrator User Guide

efiletexas.gov Court Administrator User Guide efiletexas.gov Court Administrator User Guide EFS-TX-200-3191 v.4 February 2014 Copyright and Confidentiality Copyright 2014 Tyler Technologies, Inc. All rights reserved. All documentation, source programs,

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Remote Desktop Services User's Guide

Remote Desktop Services User's Guide Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Cash Management 5.0 User Guide

Cash Management 5.0 User Guide Cash Management 5.0 User Guide Accessing Cash Management Online Banking Access Cash Management using www.busey.com as you always have. 1. Enter your company ID as assigned by your financial institution

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

Frequently Asked Questions:

Frequently Asked Questions: Frequently Asked Questions: What is new in Community Online? What do I have to do to use the new system? How do I devise a Password to access Community Online? Forgotten your Community Online Password?

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

SpringCM Troubleshooting Guide for Salesforce

SpringCM Troubleshooting Guide for Salesforce SpringCM Troubleshooting Guide for Salesforce July 2013 TABLE OF CONTENTS FAQS:... 3 WHY DID I NOT RECEIVE A SPRINGCM ACTIVATION EMAIL?... 3 WHY DON T MY SALESFORCE USERS HAVE ACCESS TO SPRINGCM?... 3

More information

Comodo One Software Version 1.8

Comodo One Software Version 1.8 rat Comodo One Software Version 1.8 Patch Management Module Administrator Guide Guide Version 1.8.100915 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction

More information

Cash Management. Getting Started Guide

Cash Management. Getting Started Guide Cash Management Getting Started Guide Table of Contents Accessing Cash Management Online... 3 Multifactor Authentication... 3 Navigation... 5 Administration... 5 Manage Users... 6 User Activity Reports...

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Windows XP Exchange Client Installation Instructions

Windows XP Exchange Client Installation Instructions WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show

More information

Network DK2 DESkey Installation Guide

Network DK2 DESkey Installation Guide VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-056-306 DESkey Network Server Manual Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...

More information

Administering Jive for Outlook

Administering Jive for Outlook Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4

More information

Security Upgrade FAQs

Security Upgrade FAQs Security Upgrade FAQs Your online security is important to us. Soon, we ll be upgrading your online banking experience to include a new security service, which is known in the online security industry

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

RMFT Web Client User Guide

RMFT Web Client User Guide RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,

More information

HIRSCH Velocity Web Console Guide

HIRSCH Velocity Web Console Guide HIRSCH Velocity Web Console Guide MAN012-1112 HIRSCH Velocity Web Console Guide MAN012-1112, November 2012 Version 1.1 Copyright 2012 Identive Group. All rights reserved. ScramblePad and ScrambleProx are

More information

Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules

Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules Getting Started User Name Rules All user names must: Be unique. Be between six and 40 characters in length. Notes: It is recommended that user names consist only of alphanumeric characters (A-Z, 0-9).

More information

Velocity Web Services Client 1.0 Installation Guide and Release Notes

Velocity Web Services Client 1.0 Installation Guide and Release Notes Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2007, 2010 & 2013 for Windows... 3 Outlook for Mac 2011... 5 Mac OS X

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Single Sign-On Administrator s Guide

Single Sign-On Administrator s Guide Single Sign-On Administrator s Guide Released 11/22/2013 About this Guide This guide is designed for the people who handle software administrative duties for their agency or organization, and have the

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

5.0 Secure Meeting Error Messages

5.0 Secure Meeting Error Messages Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Contents 5.0 Secure Meeting Error Messages...1 Contacting Juniper...1 Administrator

More information

How to configure your Windows PC post migrating to Microsoft Office 365

How to configure your Windows PC post migrating to Microsoft Office 365 How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365

More information

ProgressBook CentralAdmin User Guide

ProgressBook CentralAdmin User Guide ProgressBook CentralAdmin User Guide ProgressBook CentralAdmin User Guide (This document is current for ProgressBook v14.2.0 or later.) 2013 Software Answers, Inc. All Rights Reserved. All other company

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

BaseManager & BACnet Manager VM Server Configuration Guide

BaseManager & BACnet Manager VM Server Configuration Guide BaseManager & BACnet Manager VM Server Configuration Guide For Self-Hosted BaseManager & BACnet Manager Servers Deployed as Virtual Machines August 27, 2015 Customer Service 1-866-294-5847 i Baseline Inc.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Infor Xtreme Browser References

Infor Xtreme Browser References Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

Managing policies. Chapter 7

Managing policies. Chapter 7 Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to

More information

Gate City Bank Online Business Banking i

Gate City Bank Online Business Banking i Gate City Bank Online Business Banking i Table Of Contents Table of Contents Online Business Banking... 5 Online Business Banking Overview... 5 Features and Services... 5 FREE* Online Business Banking...

More information

Self-Service Portal Registering, downloading & activating a soft token

Self-Service Portal Registering, downloading & activating a soft token Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

dotmailer for Salesforce Installation Guide Winter 2015 Version 2.30.1

dotmailer for Salesforce Installation Guide Winter 2015 Version 2.30.1 for Salesforce Installation Guide Winter 2015 Version 2.30.1 Page 1 CONTENTS 1 Introduction 2 Browser support 2 Self-Installation Steps 2 Checks 3 Package Download and Installation 4 Users for Email Automation

More information

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Document Revision History Version # Revision Sections Summary of Changes Initials Date Affected 1.0 4/27/2006 All Version

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information